Creating Users to Access the Cluster

In this lesson, we will create a user based on a fictitious character named 'John Doe` who wants to access our cluster.

Understanding the Scenario

The word about Kubernetes awesomeness is spreading in your company. People are becoming curious and would like to try it out.

Since you are the Kubernetes guru, it came as no surprise that you received a call from John Doe. He wants to “play” with Kubernetes, but he does not have time to set up his own cluster. Since he knows that you already have a cluster up and running, he’d appreciate if you would let him use yours.

Since you have no intention of giving John your certificates, you decide to let him authenticate with his user.

Installing OpenSSL

You will have to create certificates for him, so the first step you’ll need to do is to verify that OpenSSL is installed on your laptop.

Get hands-on with 1200+ tech skills courses.